Scanning 2D barcodes, finding free Wi-Fi access points, sending SMS messages, listening to music, and watching MP4 videos: these are very common activities that we do using our smartphones.
Can you imagine that simply doing these things can get your smarphones infected with "worms" that can not only steal personal information from your phone, but also infect your friends's phones.
Sound scary? It will not be long before worms like this spread among smartphones. What makes the attacks feasible is an emerging technology called HTML5-based app development, and it has been rapidly gaining popularity in the mobile industry.
When the adoption of this technology reaches certain threshold, attacks like this will become quite common, unless we do something to stop it. A recent Gartner report says that by 2016, fifty percent of the mobile apps will be using HTML5-based technologies.
All major mobile systems will be affected, including Android, iOS, Blackberry, Windows Phone, etc., because they all support HTML5-based mobile apps.
A notorious problem of the HTML5-based technology is that malicious code can be easily injected into the program and get executed. That is why the Cross-Site Scripting (XSS) attack is still one of the most common attacks in the Web.
XSS attacks can only target at web applications through a single channel (i.e. the Internet), but with the adoption of the same technology in mobile devices, we have found out that a similar type of attack can not only be launched against mobile apps, it can attack from many channels, including 2D barcode, Wi-Fi scanning, Bluetooth pairing, MP3 songs, MP4 videos, SMS messages, NFC tags, Contact list, etc. As long as an HTML5-based app displays information obtained from outside or from anohter app, it may be a potential victim.
Chris Hittinger | EurekAlert!
Simulation and Virtual Reality: Virtual Trade Fair Tour on the Smartphone
28.04.2015 | Siemens AG
A silver lining
24.04.2015 | University of California - Santa Barbara
KAIST researchers published an article on the development of a novel technique to precisely track the 3-D positions of optically-trapped particles having complicated geometry in high speed in the April 2015 issue of Optica.
Daejeon, Republic of Korea, April 23, 2015--Optical tweezers have been used as an invaluable tool for exerting micro-scale force on microscopic particles and...
A very small and rare species of shark is swimming its way through scientific literature. But don't worry, the chances of this inches-long vertebrate biting...
Ever since computers have been small enough to be fixtures on desks and laps, their central processing has functioned something like an atomic Etch A Sketch, with electromagnetic fields pushing data bits into place to encode data.
Unfortunately, the same drawbacks and perils of the mechanical sketch board have been just as pervasive in computing: making a change often requires starting...
How is lightning initiated in thunderclouds? This is difficult to answer - how do you measure electric fields inside large, dangerously charged clouds? It was discovered, more or less by coincidence, that cosmic rays provide suitable probes to measure electric fields within thunderclouds. This surprising finding is published in Physical Review Letters on April 24th. The measurements were performed with the LOFAR radio telescope located in the Netherlands.
How is lightning initiated in thunderclouds? This is difficult to answer - how do you measure electric fields inside large, dangerously charged clouds? It was...
Max Planck researcher Buhalqem Mamtimin determines how much nitrogen oxide is released into the atmosphere from agriculturally used oases.
In order to make statements about current and future air pollution, scientists use models which simulate the Earth’s atmosphere. A lot of information such as...
23.04.2015 | Event News
23.04.2015 | Event News
13.04.2015 | Event News
28.04.2015 | Press release
28.04.2015 | Power and Electrical Engineering
28.04.2015 | Earth Sciences